Revision as Allowed
Each funding opportunity specifies the participating organizations. Applications must fit within the mission of at least one participating funding organization and meet all opportunity-specific requirements.
With the gradual maturity of 6G (sixth-generation mobile communication network) technology, the security and privacy protection of Internet of Things (IoT) devices have become the research focus areas. This paper discusses how to improve the security and privacy protection level of IoT devices in a 6G network environment to deal with the low success rate of device authentication, inaccurate detection of malicious behavior, poor vulnerability detection and repair, and weak anti-attack capabilities. In this study, a security architecture for IoT smart devices for 6G networks is first designed; then, a full-dimensional dynamic convolutional network (FDCN) is introduced to learn the IQ (in-phase and quadrature) signal characteristics of the device and complete the device authentication; then, malicious programs are detected through feature differences to achieve security monitoring; finally, a set of vulnerability repair processes is designed. Through experimental verification, the method proposed in this paper has a device authentication success rate of 92% to 100% when the number of authentication attempts is 10 to 50; when the sample size is 100 to 5000, the malicious behavior detection accuracy rate remains between 88 and 95%; in addition, the vulnerability detection time and anti-attack ability have also been significantly improved. Compared with existing methods such as blockchain, edge computing, and joint learning, this method reduces the vulnerability detection time by 12.62 s, 15.08 s, and 13.43 s, respectively; when the attack complexity is 10, the attack resistance reaches 93.59%, which is much higher than other methods.
This is a preview of subscription content, log in via an institution to check access.
Subscribe and save.
Price includes VAT (Russian Federation)
Instant access to the full article PDF.
Rent this article via DeepDyve
Institutional subscriptions
Abdur Rahman Md, Shamim Hossain M (2022) A deep learning assisted software-defined security architecture for 6G wireless networks: IIoT perspective. IEEE Wireless Commun 29(2):52–59. https://doi.org/10.1109/MWC.006.2100438
Article Google Scholar
Alzubi Jafar A (2020) Hashed Needham Schroeder industrial IoT based cost optimized deep secured data transmission in the cloud. Measurement 150:107077. https://doi.org/10.1016/j.measurement.2019.107077
Alzubi Omar A, Alzubi Jafar A, Shankar K, Gupta Deepak (2021) Blockchain and artificial intelligence-enabled privacy-preserving medical data transmission in Internet of things. Transa Emerging Telecommun Technolo 32(12):e4360. https://doi.org/10.1002/ett.4360
Alzubi Jafar A, Alzubi Omar A, Singh Ashish, Ramachandran Manikandan (2022) Cloud-IIoT-based electronic health record privacy-preserving by CNN and blockchain-enabled federated learning. IEEE Transa Ind Inf 19(1):1080–1087. https://doi.org/10.1109/TII.2022.3189170
Aman Muhammad Naveed, Javaid Uzair, Sikdar Biplab (2021) Security function virtualization for IoT applications in 6G networks. IEEE Communi Stand Mag 5(3):90–95. https://doi.org/10.1109/MCOMSTD.201.2100023
Davis BD, Mason JC, Anwar M (2020) Vulnerability studies and security postures of IoT devices: A smart home case study. IEEE Internet Things J 7(10):10102–10110. https://doi.org/10.1109/JIoT.2020.2983983
Fourati Hasna, Maaloul Rihab, Chaari Lamia (2021) A survey of 5G network systems: challenges and machine learning approaches. Int J Mach Learn Cyberne 12(2):385–431. https://doi.org/10.1007/s13042-020-01178-4
Gheisari Mehdi, Najafabadi HE, Alzubi JA, Gao J, Wang G, Abbasi AA et al (2021) OBPP: an ontology-based framework for privacy-preserving in IoT-based smart city. Future Generation Computer Systems. 123:1–13. https://doi.org/10.1016/j.future.2021.01.028
Giordani M, Polese M, Mezzavilla M, Rangan S, Zorzi M (2020) Toward 6G networks: use cases and technologies. IEEE Commun Mag 58(3):55–61. https://doi.org/10.1109/MCOM.001.1900411
Jin B, Xiaojie Xu (2024) Forecasting wholesale prices of yellow corn through the Gaussian process regression. Neural Comput Appl 36(15):8693–8710. https://doi.org/10.1016/j.meaene.2024.100001
Jin B, Xu X (2024) Wholesale price forecasts of green grams using the neural network[J]. As J Econo Bank. https://doi.org/10.1108/AJEB-01-2024-0007
Jin B, Xu X (2024b) Pre-owned housing price index forecasts using Gaussian process regressions [J]. J Model Manag. https://doi.org/10.1108/JM2-12-2023-0315
Kim Jin Ho (2021) 6G and Internet of Things: a survey. J Manage Analyti 8(2):316–332. https://doi.org/10.1080/23270012.2021.1882350
Li Yang, Feng Juan Lu, Xiuli Liu Qiang (2019) Design of security monitoring system for smart home based on internet of things. Modern Electr Technol 42(8):55–58
Google Scholar
Liu Y, Zhang J, Zhan J (2021) Privacy protection for fog computing and the internet of things data based on blockchain. Clust Comput 24(2):1331–1345. https://doi.org/10.1007/s10586-020-03190-3
Mafakheri B, Heider-Aviet A, Riggio R, Goratti L (2021) Smart contracts in the 5G roaming architecture: the fusion of blockchain with 5G networks. IEEE Commun Mag 59(3):77–83. https://doi.org/10.1109/MCOM.001.2000857
McLaney Elizabeth (2022) A framework for interprofessional team collaboration in a hospital setting: advancing team competencies and behaviors. Healthcare Manag Forum 35:2. https://doi.org/10.1177/0840470421106358
Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 6(5):8182–8201. https://doi.org/10.1109/JIoT.2019.2935189
Nguyen V-L, Lin P-C, Cheng B-C, Hwang R-H, Lin Y-D (2021) Security and privacy for 6G: A survey on prospective technologies and challenges. IEEE Commun Surv Tutorials 23(4):2384–2428. https://doi.org/10.1109/COMST.2021.3108618
Rajesh Sreeja, Paul V, Menon VG, Khosravi MR (2019) A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry 11(2):293. https://doi.org/10.3390/sym11020293
Satyam Dwivedi, Shreevastav Ritesh, Munier Florent, Nygren Johannes, Siomina Iana, Lyazidi Yazid et al (2021) Positioning in 5G networks. IEEE Commun Mag 59(11):38–44. https://doi.org/10.1109/MCOM.011.2100091
Stergiou CL, Psannis KE, Gupta BB (2020) IoT-based big data secure management in the fog over a 6G wireless network. IEEE Internet Things J 8(7):5164–5171. https://doi.org/10.1109/JIoT.2020.3033131
Tao Han, de Igor L, Ribeiro Naercio Magaia, Preto Joao, Afonso H, Segundo Fontes N, Antonio Roberto L et al (2021) Emerging drone trends for blockchain-based 5G networks: open issues and future perspectives. IEEE Network 35(1):38–43. https://doi.org/10.1109/MNET.011.2000151
Ullo Silvia Liberata, Sinha Ganesh Ram (2020) Advances in smart environment monitoring systems using IoT and sensors. Sensors 20(11):3113. https://doi.org/10.3390/s20113113
Wang M (2020) Security and privacy in 6G networks: New areas and new challenges. Digital Commun Netw 6(3):281–291
Wen Miaowen, Li Qiang, Kim Kyeong Jin, Lopez-Perez David, Dobre Octavia A, Vincent Poor H et al (2021) Private 5G networks: concepts, architectures, and research landscape. IEEE J Sel Top Signal Proce 16(1):7–25. https://doi.org/10.1109/JSTSP.2021.3137669
Yadawad R, Kulkarni UP, Alzubi JA (2024) Auto-metric graph neural network for attack detection on IoT-based smart environment and secure data transmission using advanced wild horse standard encryption method. Int J Comp Netw Inf Security 16(3):1–15. https://doi.org/10.5815/ijcnis.2024.03.01
Yan Lin, Zeng M, Ren S, Luo Z (2021) Encrypted traffic identification by fusing softmax classifier with its angular margin variant. IEICE Trans Inf Syst 104(4):517–520. https://doi.org/10.1587/transinf.2020EDL8130
Yang H, Alphones A, Xiong Z, Niyato D, Zhao J, Kaishun Wu (2020) Artificial-intelligence-enabled intelligent 6G networks. IEEE Network 34(6):272–280. https://doi.org/10.1109/MNET.011.2000195
Yao Xuanxia, Farha Fadi, Li Rongyang, Psychoula Ismini, Chen Liming, Ning Huansheng (2021) Security and privacy issues of physical objects in the IoT: challenges and opportunities. Digital Commun Netw 7(3):373–384. https://doi.org/10.1016/j.dcan.2020.09.001
Zhang S (2019) An overview of network slicing for 5G. IEEE Wirel Commun 26(3):111–117. https://doi.org/10.1109/MWC.2019.1800234
Zhenyu W, Yang G, Shaoqing Li, Shen H, Ding D (2022) Design of Efficient Anonymous Identity Authentication Protocol for Lightweight IoT Devices. Journal of Communications 43(7):49–61. https://doi.org/10.11959/j.issn.1000-436x.2022125
Download references
This work was supported by the Shandong Province Art Key Project (L2021Q07080186).
Authors and affiliations.
College of Information Engineering, Weifang Engineering Vocational College, Qingzhou, 262500, Shandong, China
Hailin Liu, Yuanyuan Wang & Fengqi Jia
You can also search for this author in PubMed Google Scholar
Correspondence to Hailin Liu .
Conflicts of interest.
The authors declare that there are no conflicts of interest regarding the publication of this article.
Publisher's note.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
Reprints and permissions
Liu, H., Wang, Y. & Jia, F. Security and Privacy Protection of Internet of Things Devices in 6G Networks. Int J Syst Assur Eng Manag (2024). https://doi.org/10.1007/s13198-024-02512-7
Download citation
Received : 04 July 2024
Revised : 27 August 2024
Accepted : 08 September 2024
Published : 24 September 2024
DOI : https://doi.org/10.1007/s13198-024-02512-7
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
IMAGES
VIDEO
COMMENTS
2. Prepare your paper for submission. Download our get published quick guide opens in new tab/window, which outlines the essential steps in preparing a paper.(This is also available in Chinese opens in new tab/window).It is very important that you stick to the specific "guide for authors" of the journal to which you are submitting.
Submissions must also include images, captions, and sourcing as per the style guide. Failure to follow these guidelines will result in your submission being archived without response. Please be aware that a small fraction of submissions are chosen for publication. Submissions welcome to the editors via [email protected].
3. Submit and revise. You can submit to most Elsevier journals using our online systems. The system you use will depend on the journal to which you submit. You can access the relevant submission system via the "submit your paper" link on the Elsevier.com journal homepage of your chosen journal. Alternatively, if you have been invited to submit ...
Sun and Linton (2014), Hierons (2016) and Craig (2010) offer useful discussions on the subject of "desk rejections.". 4. Make a good first impression with your title and abstract. The title and abstract are incredibly important components of a manuscript as they are the first elements a journal editor sees.
References should be included. Figures should not be copyrighted. Please submit your work to [email protected]. Note: After initial submission, writers whose articles are being considered for publication may be asked to resubmit their articles according to more specific guidelines. MIT International Review.
As an Elsevier author, when submitting your article, you can choose to store your data in a repository like Mendeley Data, in order to make your dataset independently citable, and link it with your article. You can also choose to submit a brief, peer-reviewed data article. Your data article will be published in the dedicated, open access ...
Read more. - Electronic submission. - Reviewing and acceptance. - Managing copyright - The "MyPublication" process. - Copy editing and language polishing. - Data processing and type setting. - Article Tracking. - Checking your article: proofing procedure. - e.Proofing - Makes editing easy!
Step 1: Choosing a journal. Choosing which journal to publish your research paper in is one of the most significant decisions you have to make as a researcher. Where you decide to submit your work can make a big difference to the reach and impact your research has. It's important to take your time to consider your options carefully and ...
Once you think your manuscript is ready for submission, the next important step is to read the aims and scope of the journals in your target research area. Doing so will improve the chances of having your manuscript accepted for publishing. Submit a cover letter with the manuscript. Never underestimate the importance of a cover letter addressed ...
Call for papers in your subject area. Journals regularly 'call for papers', asking for submissions within a particular field or topic. Answering these is a great way to get published, making sure your research fits the journal's aims and scope. Simply select your subject area with our handy tool to get started. Search current calls for ...
The publication process explained. The path to publication can be unsettling when you're unsure what's happening with your paper. Learn about staple journal workflows to see the detailed steps required for ensuring a rigorous and ethical publication. Your team has prepared the paper, written a cover letter and completed the submission form.
The introduction section should be approximately three to five paragraphs in length. Look at examples from your target journal to decide the appropriate length. This section should include the elements shown in Fig. 1. Begin with a general context, narrowing to the specific focus of the paper.
It will give your article additional visibility. Our submission systems will offer the option to include your funding source in a standardized way. In most cases you will be able to choose your funder from the given list. Otherwise, please add it manually. The funding information will be published as searchable meta-data for the accepted article.
To Publish a Research Paper follow the guide below: Conduct original research: Conduct thorough research on a specific topic or problem. Collect data, analyze it, and draw conclusions based on your findings. Write the paper: Write a detailed paper describing your research.
A. Yes, instead of giving the volume and page number, you can give the paper's DOI at the end of the citation. For example, Nature papers should be cited in the form; Author (s) Nature advance ...
The introduction section should be approximately three to five paragraphs in length. Look at examples from your target journal to decide the appropriate length. This section should include the elements shown in Fig. 1. Begin with a general context, narrowing to the specific focus of the paper.
3. Submit your article according to the journal's submission guidelines. Go to the "author's guide" (or similar) on the journal's website to review its submission requirements. Once you are satisfied that your paper meets all of the guidelines, submit the paper through the appropriate channels.
Beyond this, the title should indicate the research methodology and topic of the paper. The abstract should provide a summary of the objective, methods, results, and significance of the research. Most researchers are likely to find published papers through an electronic search (either via subject databases, or search engines such as Google).
International History: The journal encourages manuscript submissions in the form of scholarly essays on all aspects of international history, using any historical approach and historical research. The journal welcomes manuscripts that draw on political, social, diplomatic, cultural, gender, race, military, and economic histories that are ...
Ensure that your submission package is complete. Understand the submission process/system used for publishing in an international journal and find out whom to contact and how in case you have queries. Write a compelling cover letter. This document is probably the first submission item that a journal editor will read and can influence the fate ...
Before submitting your paper, it is wise to revise it and correct any factual errors and knowledge gaps that might have occurred. Step 4: Submit Your Paper ... To publish a research paper in an international journal, it is necessary to research international journals that specialise in your field. Your paper should adhere to all international ...
Submit your Research. Articles are published rapidly as soon as they are accepted, after passing a series of prepublication checks to assess originality, readability, author eligibility, and compliance with Stosunki Międzynarodowe - International Relations's policies and ethical guidelines. Peer review by invited experts, suggested by the ...
Choose the journal in which you want to publish the paper. Check the sample paper and "Instruction to Authors" or "Author's Guide" of that particular journal. Prepare your manuscript according to the format. Every journal article follows a specific format, such as Abstract, Introduction, Methods, Results, Discussion, Conclusion, and ...
Small, self-contained research projects; Development of research methodology; Development of new research technology; A doctoral student may not apply for an R03 grant to support thesis or dissertation research. An R03 award may be used to assist students who are pursuing dissertation studies when the work is within the scope of the R03 award.
With the gradual maturity of 6G (sixth-generation mobile communication network) technology, the security and privacy protection of Internet of Things (IoT) devices have become the research focus areas. This paper discusses how to improve the security and privacy protection level of IoT devices in a 6G network environment to deal with the low success rate of device authentication, inaccurate ...